PdfPrep.com

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring?

Company policy requires that all company laptops meet the following baseline requirements:

Software requirements:

Antivirus

Anti-malware

Anti-spyware

Log monitoring

Full-disk encryption

Terminal services enabled for RDP

Administrative access for local users

Hardware restrictions:

Bluetooth disabled

FireWire disabled

WiFi adapter disabled

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO).
A . Group policy to limit web access
B . Restrict VPN access for all mobile users
C . Remove full-disk encryption
D . Remove administrative access to local users
E . Restrict/disable TELNET access to network resources
F . Perform vulnerability scanning on a daily basis
G . Restrict/disable USB access

Answer: D, G

Exit mobile version